scholarly journals An Efficient Approach for Secure Storage, Search using AES in Cloud Storage

2018 ◽  
Vol 7 (3.12) ◽  
pp. 661
Author(s):  
P Anjaiah ◽  
C Raghavendra ◽  
K Rajendra Prasad

The expanded rate of development and adaption of distributed computing, day by day, more delicate data is being brought together onto the cloud. For the security of profitable data, the information must be encoded before externalization. The current inquiry procedures enable the client to seek over encoded information utilizing keyword yet these methods represent just correct hunt. There is no resilience for grammatical errors and organization irregularities which are typical client conduct. This makes compelling information stockpiling and use an exceptionally difficult errand, providing client seeking extremely baffling and wasteful. In this paper, we concentrate on secure capacity utilizing Advanced Encryption Standard (AES) and data recovery by performing Fuzzysearch on information which is scrambled while transferring on the cloud. We are proposing the execution of a progressed Fuzzykeywordtechnique called the Wildcard based procedures which restores the coordinating records when clients seeking inputs definitely coordinate the predefined keyword or the nearest conceivable coordinating documents in light of likeness catchphrase semantics when correct match comes up short. In the proposed method, using alter separation to measure keywords similitude and build up a proficient strategies for developing fuzzy keyword sets, which concentrate on diminishing the capacity and portrayal overtop.   

2019 ◽  
pp. 1393-1407
Author(s):  
R. Deepthi Crestose Rebekah ◽  
Dhanaraj Cheelu ◽  
M. Rajasekhara Babu

Cloud computing is one of the most exciting technologies due to its ability to increase flexibility and scalability for computer processes, while reducing cost associated with computing. It is important to share the data securely, efficiently, and flexibly in cloud storage. Existing data protection mechanisms such as symmetric encryption techniques are unsuccessful in preventing data sharing securely. This article suggests Key aggregate cryptosystem which produce constant size ciphertexts in order to delegate decryption rights for any set of ciphertexts. The uniqueness is that one can aggregate any number of secret keys and make them as compact as a single key. This compact aggregate key can be easily sent to others with very limited secure storage.


2018 ◽  
Vol 7 (3.6) ◽  
pp. 55
Author(s):  
Neha Narayan Kulkarni ◽  
Shital Kumar A. Jain ◽  
. .

Recently the technologies are growing fast, so they have become the point of source and also the sink for data. Data is generated in large volume introducing the concept of structured and unstructured data evolving "Big Data" which needs large memory for storage. There are two possible solutions either increase the local storage or use the Cloud Storage. Cloud makes data available to the user anytime, anywhere, anything. Cloud allows the user to store their data virtually without investing much. However, this data is on cloud raising a concern of data security and recovery. This attack is made by the untrusted or unauthorized user remotely. The attacker may modify, delete or replace the data. Therefore, different models are proposed for a data integrity check and proof of retrievability. This paper includes the literature review related to various techniques for data integrity, data recovery and proof of retrievability.  


2019 ◽  
Vol 22 (4) ◽  
pp. 1173-1185 ◽  
Author(s):  
Andrei Tchernykh ◽  
Vanessa Miranda-López ◽  
Mikhail Babenko ◽  
Fermin Armenta-Cano ◽  
Gleb Radchenko ◽  
...  

2019 ◽  
Vol 8 (2) ◽  
pp. 64-69
Author(s):  
Vidyaathulasiraman . ◽  
G. Manikandan

Past days rulers and publics need to convey message their relatives or one place to somewhere else with the assistance of some correspondence channels like birds or individuals like present mailmen or post ladies and days are passing and development of data and innovation the communication quick and less expansive and present day interchanges totally through on the web. Day by day populaces development and innovation utilizing people groups heterogeneously expanding. So present days network is a critical part and significant assuming jobs in day by day life its outcomes more system issues like less throughput, insufficient network resources, less flags, resource not similarly shared for a given time frame, time complicity because of this troubles the communication mostly or here and there totally interfered with now daily’s a fundamental piece of information is an expected portion to social and economic related change and it is logically expanding worldwide condition. In this exploration essentially an undertaking has been made to classify secured sharing models, architecture, sharing arrangements and load adjusting algorithms in w3. At present need to configure modern load adjusting algorithms on account of our central and state Government focusing propelled correspondences and modernized classrooms through distributed computing.


2018 ◽  
Vol 3 (7) ◽  
pp. 74
Author(s):  
Mousumi Hasan Mukti ◽  
Sabina Zaman ◽  
Khalil Ahammad ◽  
Chowdhury Shahriar Muzammel

Cloud computing is being considered as a revolutionary technique in the field of enterprise hardware and software design and development. As the popularity of cloud computing is increasing day by day and it’s the mostly used technique in the online and automated business system, so the security of the stored data in the cloud and the accessing method of the data through the network must be ensured. Among the various types of server and network authentication protocol Kerberos is the latest and robust network protocol. For authentication, Kerberos is badly in need of a hosted server which has to be remaining running 24*7 and the access point should be a single server (centralized authentication service). Besides these, if the single server gets down, there is possibility of more attack as Kerberos can’t function its job. These are the major hindrance of Kerberos. This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. RAID 5 is the most appropriate technique to recover from failure and in correcting the erroneous data by minimizing redundancy as well as mitigating data loss. Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.


2013 ◽  
pp. 542-558
Author(s):  
Vincenzo Daniele Cunsolo ◽  
Salvatore Distefano ◽  
Antonio Puliafito ◽  
Marco Scarpa

In grid computing infrastructures, the data storage subsystem is physically distributed among several nodes and logically shared among several users. This highlights the necessity of: (i) Availability for authorized users only, (ii) Confidentiality, and (iii) Integrity of information and data: in one term security. In this work we face the problem of data security in grid, by proposing a lightweight cryptography algorithm combining the strong and highly secure asymmetric cryptography technique (RSA) with the symmetric cryptography (Advanced Encryption Standard, AES). The proposed algorithm, we named Grid Secure Storage System (GS3), has been implemented on top of the Grid File Access Library (GFAL) of the gLite middleware, in order to provide a file system service with cryptography capability and POSIX interface. The choice of implementing GS3 as a file system allows to protect also the file system structure, and moreover to overcome the well-known problem of file rewriting in gLite/GFAL environments. This chapter describes and details both the GS3 algorithm and its implementation, also evaluating the performance of such implementation and discussing the obtained results.


2020 ◽  
pp. 31-38
Author(s):  
Himani Rawat

Data Storage is recently an emerging concern of this era. As the data is increasing day-by-day, storage has become a major issue. Although, there exists different kinds of storage mechanisms which include physical storage drives, cloud storages,Hybrid Storages & In-memory storages. But Cloud Storage application such as One Drive, Dropbox and Google Drive are more convenient as data is not limited to a fixed size. One Drive is one of the most popular storage drive. One Drive is a Cloud Storage Application which allows user to store, share and edit the file in the cloud based environment.


Sign in / Sign up

Export Citation Format

Share Document